TTLS-PAP accounting bug

2007-06-15 Thread Sam Schultz
I was just wondering if the bug from this post has been fixed since 1.1.6: Re: EAP-TTLS outer identity accounting After alot of experimenting researching, I still haven't found a solution to the TTL anonymous outer identity being used for accounting. I have set a DEFAULT entry that sets the

EAP-TTLS Accounting Bug

2007-05-17 Thread Sam Schultz
] On Behalf Of Sam Schultz Sent: Wednesday, March 14, 2007 7:14 PM To: freeradius-users@lists.freeradius.org Subject: Re: RE : EAP-TTLS outer identity accounting An entry like: DEFAULT Realm == test, Autz-Type := sql-test User-Name = %{User-Name} does add a new User

Re: LDAP + CHAP problem

2007-03-27 Thread Sam Schultz
I have implement freeradius with LDAP + cisco VPDN my problem is my authentication working with PAP but when i try for authentication from CHAP it is not working error is password not clear text so i have read many document about it and ppl talking about store passwd in

Re: EAP-TTLS outer identity accounting

2007-03-21 Thread Sam Schultz
I can also vouch for freeradius 1.0.5 after building retro-fitting my configuration to it. I'll probably just downgrade to an earlier 1.1.x build, since I haven't seen any major security vulnerabilities/ fixes since the early 1.0.x builds. On Tue, 20 Mar 2007 16:53:26 -0500 [EMAIL PROTECTED]

Re: EAP-TTLS outer identity accounting

2007-03-20 Thread Sam Schultz
On Tue, 20 Mar 2007 09:38:25 -0500 Alan DeKok [EMAIL PROTECTED] wrote: Sam Schultz wrote: I have set a DEFAULT entry that sets the User-Name attribute via ':=', but I still end up with two User-Name attributes (anonymous identity real identity). This is especially strange, since

Re: EAP-TTLS outer identity accounting

2007-03-19 Thread Sam Schultz
After alot of experimenting researching, I still haven't found a solution to the TTL anonymous outer identity being used for accounting. I have set a DEFAULT entry that sets the User-Name attribute via ':=', but I still end up with two User-Name attributes (anonymous identity real identity).

Re: Fedora RPM build issue

2007-03-15 Thread Sam Schultz
On Thu, 15 Mar 2007 12:17:11 -0500 Chris Moody [EMAIL PROTECTED] tech.net wrote: Greetings all, I am trying to create an RPM of Freeradius 1.1.5 for a Fedora Core 6 install, and following the instructions in the Wiki, the build process dies with this at the end: c/include -Ilibeap -c

Re: Reject authentication attempts based on cli value?

2007-03-15 Thread Sam Schultz
An entry like this in your 'users' file should work: DEFAULT NASIPAddress =~ 192.168.100.* Auth-Type := Reject I'm not sure '*' is the appropriate regular expression character for freeradius, but you should be able to verify that pretty quickly from the documentation. Operator

RE: Re: freeradius -peap ad/ldap

2007-03-15 Thread Sam Schultz
DEFAULT check_items (ex: Realm == 'your_domain') Autz-Type := your_ldap_instance (ex: ldap), Auth-Type := module_instance_for_authentication so i did what you recommended, which makes sense to do... i have Autz-type := eap, and in debug mode i get this clearly an

RE: Reject authentication attempts based on cli value?

2007-03-15 Thread Sam Schultz
you an option to specify this, all would be well. But... since they don't, I have to figure out how to break RADIUS for one subnet and yet allow it to function for the rest. -Original Message- From: Sam Schultz [mailto:[EMAIL PROTECTED] Sent: Thursday, March 15, 2007 12:46 PM

Re: freeradius -peap ad/ldap

2007-03-15 Thread Sam Schultz
reference the initial thread where i said i was authenticating off of active directories, using eap-peap. which i had previously working just fine. Since i didn't specify an instance name in my eap.conf, it is referenced as 'eap' (which i did read, but was following your advice). Once you

Re: freeradius -peap ad/ldap

2007-03-15 Thread Sam Schultz
On Thu, 15 Mar 2007 10:16:14 -0500 joe vieira [EMAIL PROTECTED] wrote: Hi all, I'm using the RHEL build of freeradius 1.0.1. I'm trying to do You really should upgrade that. If I recall correctly, there were some nasty bugs in the early 1.0.x builds. something that might seem totally

Re: RE : EAP-TTLS outer identity accounting

2007-03-15 Thread Sam Schultz
On Thu, 15 Mar 2007 10:51:17 -0500 Alan DeKok [EMAIL PROTECTED] wrote: Sam Schultz wrote: An entry like: DEFAULT Realm == test, Autz-Type := sql-test User-Name = %{User-Name} Please read man users for the definition and meaning of operators. You want: DEFAULT

Re: freeradius -peap ad/ldap

2007-03-15 Thread Sam Schultz
On Thu, 15 Mar 2007 10:57:29 -0500 joe vieira [EMAIL PROTECTED] wrote: Alan DeKok wrote: joe vieira wrote: i have eap-peap authentication working against our ad domain. peachy keen. what i would like to be able to do is, in our openldap environment, store attributes for retrieval

Re: EAP-TTLS outer identity accounting

2007-03-14 Thread Sam Schultz
On Tue, 13 Mar 2007 13:15:52 -0500 Alan DeKok [EMAIL PROTECTED] wrote: Sam Schultz wrote: This should be solvable by adding something like 'User-Name = %{User-Name}' to the DEFAULT entries in the users file, correct? Yes. One of my users file DEFAULT entries look like this: DEFAULT

Re: RE : EAP-TTLS outer identity accounting

2007-03-14 Thread Sam Schultz
On Wed, 14 Mar 2007 11:25:20 -0500 Thibault Le Meur [EMAIL PROTECTED] wrote: -Message d'origine- De : [EMAIL PROTECTED] radius.org [mailto:[EMAIL PROTECTED] sts.freeradius.org] De la part de Sam Schultz Envoyé : mercredi 14 mars 2007 17:13 À : freeradius-users

Re: RE : EAP-TTLS outer identity accounting

2007-03-14 Thread Sam Schultz
Sam Schultz [EMAIL PROTECTED] wrote: On Wed, 14 Mar 2007 11:25:20 -0500 Thibault Le Meur [EMAIL PROTECTED] wrote: -Message d'origine- De : [EMAIL PROTECTED] radius.org [mailto:[EMAIL PROTECTED] sts.freeradius.org] De la part de Sam Schultz Envoyé : mercredi 14 mars 2007 17:13 À

Re: EAP-TTLS outer identity accounting

2007-03-13 Thread Sam Schultz
On Tue, 13 Mar 2007 11:58:51 -0500 Alan DeKok [EMAIL PROTECTED] wrote: Sam Schultz wrote: I'm currently using EAP-TTLS PAP (via SecureW2) to authorize authenticate wireless clients against specific realms. Users are able to authorize authenticate properly, but the username in incoming

EAP-TTLS outer identity accounting

2007-03-12 Thread Sam Schultz
I'm currently using EAP-TTLS PAP (via SecureW2) to authorize authenticate wireless clients against specific realms. Users are able to authorize authenticate properly, but the username in incoming accounting replies come in as 'anonymous@realmname'. I had this spitting out proper accounting

Re: one passwd to many users

2007-03-05 Thread Sam Schultz
You could add an entry like User-Password == your_password_here to a default entry in freeradius' users file (/etc/raddb/users, usually), or do something similar using a group if you have some user accounts that will need to have different passwords. In that case, you'd need to use Group ==

[UPDATE] FreeRADIUS + LVS problem

2007-02-23 Thread Sam Schultz
According to my research, FreeRADIUS supposedly does work from behind an LVS load balancer. My current configuration works perfectly outside of the LVS, but once it is put behind the LVS it ceases to work. Connections seem to succeed even behind the LVS, until they get to an access

FreeRADIUS + LVS problem

2007-02-16 Thread Sam Schultz
According to my research, FreeRADIUS supposedly does work from behind an LVS load balancer. My current configuration works perfectly outside of the LVS, but once it is put behind the LVS it ceases to work. Connections seem to succeed even behind the LVS, until they get to an access

Re: Re: FreeRADIUS + LVS problem

2007-02-16 Thread Sam Schultz
Unfortunately, it isn't possible to use direct routing on this network. I was thinking there may be some way to coerce FR into thinking the load balancer is another radius server sending over proxied requests, or something like that. Sam Schultz wrote: From what little information I could

FR not honoring AutzType

2007-01-31 Thread Sam Schultz
I've been trying to set up FR in a realm-based configuration using only LOCAL realms that are passed to different MySQL tables via different instances. This setup, like several previous questions posted to this list for similar setups, requires conditional branching. The solution as